Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
VLD, HWS, ICD |
2024-03-01 10:50 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Pseudo-random Number Generator Design Robust against Fault Injection Attacks Sota Kado, Mingyu Yang, Yuko Hara (Tokyo Tech) VLD2023-123 HWS2023-83 ICD2023-112 |
Fault Injection Attacks (FIA) using physical methods are a significant threat for embedded devices to process various ap... [more] |
VLD2023-123 HWS2023-83 ICD2023-112 pp.125-130 |
VLD, HWS, ICD |
2024-03-01 11:40 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Improved Ring Oscillator Sensor for Laser Fault Injection Detection on FPGA Masaki Chikano (YNU), Shungo Hayashi, Junichi Sakamoto (YNU/AIST), Tsutomu Matsumoto (YNU) VLD2023-125 HWS2023-85 ICD2023-114 |
A fault attack is an attack that intentionally injects a fault into an operating device in order to leak internal confid... [more] |
VLD2023-125 HWS2023-85 ICD2023-114 pp.135-140 |
VLD, HWS, ICD |
2024-03-02 11:40 |
Okinawa |
(Primary: On-site, Secondary: Online) |
eFPGA-based IP Protection of Embedded Processor Design Tomosuke Ichioka, Tanvir Ahmed, Yuko Hara (Tokyo Tech) VLD2023-139 HWS2023-99 ICD2023-128 |
As manufacturing costs continue to grow, IC manufacturers are increasingly outsourcing IC manufacturing to third-party f... [more] |
VLD2023-139 HWS2023-99 ICD2023-128 pp.209-214 |
IA |
2024-01-25 16:10 |
Tokyo |
Kwansei Gakuin Univiversity, Marunouchi Campus (Primary: On-site, Secondary: Online) |
[Poster Presentation]
Router Security Assessment Using CAPEC Vulnerability Assessment Criteria Yu-Chaing Wang, Tai-Ying Chiu, Bor-Yao Tseng, Bagus Tri Atmaja, Jiann-Liang Chen, Shih-Ping Chiu (NTUST), Jian-Chang Hsu (ITRI) IA2023-62 |
Our research addresses the nexus of router performance and security in contemporary cyberinfrastructure. Routers, pivota... [more] |
IA2023-62 pp.30-36 |
SIP, IT, RCS |
2024-01-19 13:30 |
Miyagi |
(Primary: On-site, Secondary: Online) |
[Invited Talk]
Problem of Adversarial Attacks on CNN-based Image Classifiers and Countermeasures Minoru Kuribayashi (Tohoku Univ.) IT2023-67 SIP2023-100 RCS2023-242 |
It is well-known that discriminative models based on deep learning techniques may cause misclassification if adversarial... [more] |
IT2023-67 SIP2023-100 RCS2023-242 p.204 |
EMM |
2024-01-16 14:25 |
Miyagi |
Tohoku Univ. (Primary: On-site, Secondary: Online) |
Comparison of multi-factor authentication and improved authentication methods for increased security Kazuki Takeda, Youichi Takashima (Kaishi Professional Univ) EMM2023-81 |
Password authentication is used as an authentication method for various services, and while ID+password authentication i... [more] |
EMM2023-81 pp.7-12 |
IN, IA (Joint) |
2023-12-22 15:40 |
Hiroshima |
Satellite Campus Hiroshima |
A Cooperation Method for Countermeasure against DDoS Attacks in CDNs Interconnected by CDNI Kazuki Takashima, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) IA2023-55 |
Currently, CDNs are one of major targets of DDoS attacks.
CDNs in CDNI, which aims to interconnect various CDNs for con... [more] |
IA2023-55 pp.59-66 |
QIT (2nd) |
2023-12-17 17:30 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
An Effective Countermeasure against Time-Shift Attack and Comprehensive Analyses of Decoy-State QKD under Finite-Size Effects Toshitsugu Kato, Atsushi Okamoto, Akihisa Tomita (Hokkaido Univ.) |
One factor hindering the practical implementation of quantum cryptography is the vulnerability to eavesdropping attacks ... [more] |
|
ICM, NS, CQ, NV (Joint) |
2023-11-21 09:30 |
Ehime |
Ehime Prefecture Gender Equality Center (Primary: On-site, Secondary: Online) |
Fallback control based false injection attack defense mechanism for managed potential-based routing Tasuku Nagata, Naomi Kuze (Osaka Univ.) NS2023-109 |
Due to the rapid growth of information networks, self-organization is a promising approach for controlling network
syst... [more] |
NS2023-109 pp.1-6 |
ICM, NS, CQ, NV (Joint) |
2023-11-21 13:15 |
Ehime |
Ehime Prefecture Gender Equality Center (Primary: On-site, Secondary: Online) |
[Encouragement Talk]
Security Evaluation of Low-latency Cipher based on Improved Simon against Deep Learning Analysis using Profiled Power Consumption Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) NS2023-114 |
Society 5.0 aims to solve problems in social systems through the intercommunication of small devices. On the other hand,... [more] |
NS2023-114 pp.20-25 |
ICSS |
2023-11-16 13:25 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Real time detection for replay-attack communication in control system Koushi Nishi, Yuichi Futa (TUT), Hiroyuki Okazaki (Shinshu University) ICSS2023-52 |
Attacks on control system in factory and power plant are increasing every year. Therefore, System that monitor communica... [more] |
ICSS2023-52 pp.7-14 |
ICSS |
2023-11-16 15:20 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Attack Verification and Evaluation of Incremental Fault Analysis against AES Encryption Processing Device Miran Tamagawa, Yuichi Futa (TUT), Takehiko Mieno (AVASYS), Hiroyuki Okazaki (Shinshu University) ICSS2023-56 |
In recent years,there has been a growing concern about the impact of fault analysis attack,which use hardware failures a... [more] |
ICSS2023-56 pp.35-41 |
ICSS |
2023-11-16 16:00 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Security Analysis of MP-LWE using Weighted Lattice Reduction Yudai Tagawa, Shinya Okumura, Atsuko Miyaji (Osaka Univ.) ICSS2023-57 |
In 2017, Roşca et al. proposed the Middle-Product LWE (MP-LWE) problem, a new LWE problem variant. The MP-LWE problem mi... [more] |
ICSS2023-57 pp.42-48 |
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] |
2023-11-16 13:20 |
Kumamoto |
Civic Auditorium Sears Home Yume Hall (Primary: On-site, Secondary: Online) |
Tamper Resistance Evaluation on FPGA for Low-Latency Cipher Sonic Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2023-49 ICD2023-57 DC2023-56 RECONF2023-52 |
Industry 5.0 promotes smart factories for system optimization by utilizing IoT and AI in the industrial field. The smart... [more] |
VLD2023-49 ICD2023-57 DC2023-56 RECONF2023-52 pp.101-105 |
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] |
2023-11-17 09:35 |
Kumamoto |
Civic Auditorium Sears Home Yume Hall (Primary: On-site, Secondary: Online) |
Backside Side-Channel Attack by Silicon Substrate Voltage and Simulation Rikuu Hasegawa, Kazuki Monta, Takuya Watatsumi, Takuji Miki, Makoto Nagata (Kobe Univ) VLD2023-63 ICD2023-71 DC2023-70 RECONF2023-66 |
Integrated circuit (IC) chips equipped with cryptographic circuits are vulnerable to side-channel attacks, which use exp... [more] |
VLD2023-63 ICD2023-71 DC2023-70 RECONF2023-66 pp.173-177 |
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] |
2023-11-17 10:00 |
Kumamoto |
Civic Auditorium Sears Home Yume Hall (Primary: On-site, Secondary: Online) |
Derivation of secret keys by differential fault analysis using backside voltage fault injection Yusuke Hayashi, Rikuu Hasegawa, Takuya Wadatsumi, Kazuki Monta, Takuji Miki, Makoto Nagata (Kobe Univ.) VLD2023-64 ICD2023-72 DC2023-71 RECONF2023-67 |
Lasers have been the leading method of fault injection in fault injection attacks on cryptographic integrated circuit (I... [more] |
VLD2023-64 ICD2023-72 DC2023-71 RECONF2023-67 pp.178-181 |
ICD, HWS |
2023-10-31 14:20 |
Mie |
(Primary: On-site, Secondary: Online) |
Evaluation of Time-to-Digital Converter in Laser Fault Injection Detection on FPGA Shungo Hayashi, Junichi Sakamoto (YNU/AIST), Masaki Chikano, Tsutomu Matsumoto (YNU) HWS2023-56 ICD2023-35 |
Fault injection attacks are attacks that intentionally introduce faults into a running device in order to expose interna... [more] |
HWS2023-56 ICD2023-35 pp.10-15 |
ICD, HWS |
2023-10-31 15:25 |
Mie |
(Primary: On-site, Secondary: Online) |
CPA ToggleToggle-based Simulation against Multiplier for Pairingairing-based Cryptography Saito Kikuoka, Ikeda Makoto (Tokyo Univ.) HWS2023-58 ICD2023-37 |
Pairing-based cryptography is more secure than RSA with a shorter key length, but it is computationally expensive and mo... [more] |
HWS2023-58 ICD2023-37 pp.20-25 |
MW, EMCJ, EST, IEE-EMC [detail] |
2023-10-19 13:10 |
Yamagata |
Yamagata University (Primary: On-site, Secondary: Online) |
An Application of Genetic Algorithms for XSS Attack Payload Generation and WAF Evaluation Yu Funahashi, Hideaki Kimura (Chubu Univ) EMCJ2023-43 MW2023-97 EST2023-70 |
We propose a method of generating and evolving malicious scripts (payloads) used in cross-site scripting (XSS) attacks b... [more] |
EMCJ2023-43 MW2023-97 EST2023-70 pp.42-45 |
MIKA (3rd) |
2023-10-11 14:30 |
Okinawa |
Okinawa Jichikaikan (Primary: On-site, Secondary: Online) |
[Poster Presentation]
Detecting Poisoning Attacks Using Adversarial Examples in Deep Phishing Detection Koko Nishiura, Tomotaka Kimura, Jun Cheng (Doshisha Univ.) |
In recent years, the convenience of online services has greatly improved, but the number of phishing scams has skyrocket... [more] |
|